The kdcpreauth modules in MIT Kerberos 5 (aka krb5) 1.12.x and 1.13.x before 1.13.2 do not properly track whether a clients request has been validated, which allows remote attackers to bypass an intended preauthentication requirement by providing (1) zero bytes of data or (2) an arbitrary realm name, related to plugins/preauth/otp/main.c and plugins/preauth/pkinit/pkinit_srv.c.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Kerberos_5 | Mit | 1.12 (including) | 1.12 (including) |
Kerberos_5 | Mit | 1.12.1 (including) | 1.12.1 (including) |
Kerberos_5 | Mit | 1.12.2 (including) | 1.12.2 (including) |
Kerberos_5 | Mit | 1.12.3 (including) | 1.12.3 (including) |
Kerberos_5 | Mit | 1.13 (including) | 1.13 (including) |
Kerberos_5 | Mit | 1.13.1 (including) | 1.13.1 (including) |
Red Hat Enterprise Linux 7 | RedHat | krb5-0:1.13.2-10.el7 | * |
Krb5 | Ubuntu | trusty | * |
Krb5 | Ubuntu | upstream | * |
Krb5 | Ubuntu | utopic | * |
Krb5 | Ubuntu | vivid | * |
Krb5 | Ubuntu | vivid/stable-phone-overlay | * |
Krb5 | Ubuntu | vivid/ubuntu-core | * |